Thursday, October 10, 2019

Earth Formation

Kevin Navarrete Benham, Timothy ENC1101 Mon-Wed 9:30-10:45am 4-1-13 Formation of Earth and life on earth. About 4. 57 Billion years ago our planet earth was formed. Earth contains many things that allows us to live. How was the Earth formed and why do we live in it is a question many of us would like to find out, but there are many answers to these questions and we cannot come up with a conclusion. The theory that is said to explain the formation of our earth is called the Big Bang Theory.This theory explains that all matter in the Universe was, at one time, concentrated in a giant mass (a black hole) that blew apart about 10 to 20 billion years ago and is still expanding. Now a days, it is thought that our solar system had its first steps when, about 5 billion years ago, by some unknown process, a cloud of dust and gases collapsed and condensed. Some of the matter in the central mass compressed under its own gravity, condensed, and heated until forces were so strong that thermonucle ar reactions began. These reactions were the origin of our star, the Sun.The size of a star is related to the amount of fuel it has available to burn for energy and how fast it burns up that fuel. A star smaller than our sun would not contain enough fuel to last long enough for evolution to have occurred here on earth. A larger star would have burned its fuel too fast, and would have burned itself out long ago. It would also not last long enough for life to evolve on Earth. The center of the disk became the sun, and the particles in the outer rings turned into large burning balls of gas and molten-liquid that cooled and condensed to take on solid form.Four or five billion years ago, they turned into the planets that we know today as Earth, Mars, Venus, and the outer planets. A cloud with dust gases and many more particles grew together and condensed to form the planets, comets, asteroids, and many other things about 4. 6 billion years ago. It is thought that Earth began as a very co ld world. It is also thought that the very first atmosphere could have been of hydrogen gas. Since this gas is so light weight and very chemically reactive, most of it would have floated off into space or reacted with other substances.The first atmosphere is thought to be due to volcanic eruption and other chemical reactions taking place. It is thought that the inner four solid planets may have began with similar atmospheres of H2O, CO2, CO, and N2. It is thought that these chemicals made up the atmosphere of our planet for the first 1 billion years. It then provided similar atmospheres for the other planets Over the past few centuries scientists have been trying to answer the question: what was the origin of life? There have been a number of scientists who have produces a number of plausible theories.The currently most excepted theory is Oparin's theory, which states that the â€Å"origin of life on Earth was in nonliving chemical substances which spontaneously formed in Earth's e arly atmosphere and combined to make more complex chemicals until living cells were formed. † This maybe a possibility because Stanley Miller a student at University of Chicago, began experimenting to prove Oparin's theory. He created a device that dispersed gas's that were likely to be present in the early atmosphere, and then he pased an electrical discharge, stimulating the UV rays present in the early atmosphere.After allowing the experiment to continue for a week, the results were amazing. However, there have been other theories that do not support this experiment. The Cosmozoa theory which states that life was brought to earth from somewhere else, and the theory states that life can suddenly and spontaneously appear. All in all there are many perspectives and theories of the origin of life and the formation of the Earth. Each of these theories sound very good, but there is no proof that it really happened this way. Word Count 1207

Kris Corporation Information Technology Proposal Essay

Kris Corporation Information Technology Proposal Introduction Information Technology Proposal   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kris Corporation is a prominent company that deal with manufacturing parts utilized by the automotive industry. The organization’s Active-Domain infrastructure comprises of two main domains. The parent domain is kris.local and the child domain is corp.kris.local. The AD infrastructure of the organization is running on Server 2008. The company has five branches located in five cities namely, Chicago (IL), Baltimore (MD), Atlanta (GA), Seattle (WA) and San Diego (CA). Its manufacturing plants are located in Seattle and Atlanta.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Recently, the company has developed a number of concerns relating to its information system. First, the corporation is concerned about adopting multiple domains in its information systems. Secondly, some automobile manufacturing companies have approached the corporation and requested it to use a single identity in the process of procuring orders. Kris Corporation is also concerned with disaster recovery of its systems and physical space of servers especially at the Atlanta branch since it is the corporation’s headquarter. File sharing is also a big concern to the company since the locations are connected to the internet independently.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This proposal focuses on identifying and analyzing various changes in the information technology department of the company and developing solution recommendations for information technology problems experienced by the company. The proposal will discuss various benefits the corporation will acquire from updating and changing the current information systems to the modern systems. Active Directory   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kris Corporation should adopt the new Windows Server 2012 in its information systems due to the following reasons. First, the server has the freedom to choose the interface. This means that by installing the Server Core it will prove security and performance advantage. In addition, it has a feature that allows one to switch it on or off. Secondly, the server manager is a multi-server making it easy to deploy features and roles to physical and virtual server. It also makes easy to merge servers that can be managed together hence, easing the administration of servers (Snover, 2012).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Thirdly, Windows Server 2012 provides a Dynamic Access Control (DAC) which helps to create more centralized security models for access to the network. This is done by tagging the sensitive data both, manually and automatically on the basis of creator of the files and the content of the files. In addition, Windows Server 2012 have a large storage spaces, a new feature that allow the usage of inexpensive hard drives to create a storage which can be subdivided into spaces as those used on physical disk.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Window Server 2012 also possesses Hyper –V Replica administrator which replicates their Hyper- Virtual machine from Hyper –v host at a primary site to another Hyper-V host at the replica site. This feature has the advantage of lowering the cost of ownership in an organization by providing workload –agonistic and storage- agonistic solution which replicates effectively, efficiently and periodically over IP-based network within or across different storage subsystems and across all sites. The major benefit of Hyper-V Replica is that virtual machine can easily replicate in distinct locations for higher protection and to ensure availability. Window server 2012 also possesses Direct Access, which works with IPv4 that do not require conversion of technologies and switching off the server that are running. Direct access version of 2012 server is easier to configure too.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The window server 2012 has Remote Desktop Service that provides the ability to control and centralize the applications and data that the employees need t work on from variety of machines or devices making it easy to work anywhere as long as you access a device. It also supports that control and compliance are met strictly. Lastly windows server 2012 has a simplified licensing. Microsoft have worked on the complexity involves in finding the right edition and cost. Window server 2012 has only four editions; datacenter standard essential and the foundation. These editions are licensed as per number of user for the instance foundation is licensed for 15 while essential 25. Adoption and acquiring of the server depends on the size of the company and then moving ahead buying the right edition. For the case of the Kris Company, the ideal edition is Window Server 2012 R2 Essential which is the best for cloud-connected first server.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Domain model that a company uses determine its effectiveness and affects its performance. In the selection of the appropriate domain model to use, the company should consider a number of factors that may affect the selected Domain model. First, the company must consider the amount of the capacity available on the network allocated to Active Directory Domain service. The company should choose a model with maximum efficiency in replicating information with mild effects on the network bandwidth. Secondly, the company must consider the number of users. A company should use more than one domain where the number of users is large.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The corporation should migrate to a single domain and abandon the multi-domain model. The single domain is the simplest domain design that a company can use effectively. Unlike in other domain designs, there is replication of all information to all domain controllers. Secondly, single domain design minimizes the number of deployed domains in the forest. Minimizing the number of domains reduces the complexity of the application. Consequently, the total cost of ownership is reduced. Any domain controller in the single domain model can effectively authenticate a domain user in the forest. In the single domain model, all domain controllers in a company’s system can be developed to be global catalogs. This will enable the corporation to use the single identity in order procurement processes from automobile manufacturers. Lastly, the corporation should deploy the single domain model since all data can be replicated to all its geographical locations hosting domain controllers (Windows Server, 2015).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Single sign-on is a part of the modern technology where users use locally logged on credentials when connecting to hosted desktops and Remote Apps. The technology that provides the single sign-on is Windows Server 2012. Windows Server 2012 enables users to log in without using multiple certificates and without any prompts in credentials. It is much easier to configure single sign-on (SSO) into the Windows Server 2012 than in other servers. The administrator needs to enter the qualified domain name with a prefix â€Å"TERMSRV† to the server data of the Credentials Delegation Group Policy setting. The Single Sign-On can also be configured by adding the Remote Desktop Gateway (RD Gateway). Thirdly, the Single Sign-On can be configured using the command line. Click â€Å"Start†, then click â€Å"Run† and type â€Å"cmd†. Open the Enterprise Single Sign-On directory for installation and type â€Å"ssomanage-enabless o† to enable the SSO (Termserv, 2012). DNS   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A DNS server is any computer that is allowed to join the DNS. The server is responsible for running a special purpose networking software. The DNS server should reside in Seattle. Although Atlanta is the corporation’s headquarter, the location has limited space and a large number of staffs. The corporation should ensure that the DNS server reside in Seattle where there is adequate space. Secondly, there are manufacturing plants in Seattle thus it is appropriate to set up the DNS server. The IT staff should be relocated to Seattle for effective management of DNS server and IT systems.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   DNS is one of the important components in any networking system. Therefore, it is important to secure the DNS from attackers and other risks. There are a number of risks that may attack the DNS. These include DNS cache poisoning, distributed denial of service (DDoS), denial of service, reflected attacks, fast flux and reflective amplification DoS. There are various DNS security techniques and procedure that are used to protect the DNS servers. First, a latest and updated DNS server and software versions should be used. For instance, Windows Server 2012 provides more DNS protection than other servers. The Windows Server 2012 prevents attacks using security loopholes. Secondly, a freeware such as ZoneCheck can be used to check the configuration and monitor external networks. Deploying a DNS security (DNSSEC) protocol based is also a viable solution to DNS security. A DNSSEC reduces the risk of DNS cache poisoning and other DNS attacks. DHCP   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dynamic Host configuration Protocol (DHCP) is a server or client protocol that automatically provides an internet protocol host with IP address. The purpose of using DHCP in window server 2012 is that it reduces the administrative tasks and the configuring the host network complexity such as, private intranet. DHCP automates the process of configuring the IP and TCP of the client.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   DHCP offer support on DNS registration enhancements. This means that one can use HDCP policies to configure conditions on qualified domain name of DHCP client and also register workgroup computer as a guest DNS suffix. DHCP also support PowerShell DHCP server which is the task oriented for DHCP server management. Window PowerShell uses object pipelining to ease the need for parsing and alteration of test output. This window PowerShell for DHCP has got 103 cmdlets which cover multiple aspects of DHCP server configuration and management.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Another role of DHCP is to introduce a new policy based on IP address assignment feature. This allows the administrator to group DHCP client by specific tasks on fields and boost the administrator control over configuration parameters brought forth to the network device. DHCP policy enables flexibility while dealing with multiple device types, multiple roles, and virtualization. Consequently, it is important to Kris Company to consider DHCP for management of various task and device for easier access and to avoid duplication of tasks hence, lower cost of administration.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The tracking of DHCP is done using IPAM (IP Address Management) that enable IP tracking through correlation of DHCP lease happenings on managed DHCP servers with user and computer authentication happening or events on managed domain controller. The IP address tracking by use of IPAM occur using the following parameters; tracking by IP address (IPV4), tracking by hostname, tracking by username, and tracking by client ID (TechNet, 2015). Hyper-V.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hyper- V is an interesting feature in Windows servers. Consultants and system integrators say that hyper-v is a promising and effective virtualization platform. The features have both advantages and disadvantages. Hyper-V is an incorporative and important feature to clients using the Windows Server 2008 or 2012. Clients save on licensing costs while using hyper- v rather than other virtualization platforms. Secondly, Microsoft provides better support for the server application running on Hyper-V as opposed to other virtualization platforms. Hyper- V provides an option of consolidating multiple physical servers into comparatively fewer servers. Machines running the Hyper-V platforms are more effective and faster as compared to machines running other virtualization platforms. Therefore, Hyper- V is effective and fast.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hyper – V improves utilization and access to key resources such as networking, disk, and video when running guest operation systems. It is easier to deploy and manage the Hyper-V application than other virtualization platforms. However, the application is only limited to only 64 bit systems using the Windows Servers. Therefore, users with other systems such as Linux cannot use it. Secondly, the platform may be compatible with some devices using Windows Servers 2008, and others may not be incompatible. Therefore, a test for compatibility is necessary to devices. Hyper- V does not require clustering because it is a cluster aware application, and Windows Server 2008 provides a host clustering support for Hyper – V virtualized made machines.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kris Corporation can leverage various features of Hyper-V. First, Hyper-V has Access Control through authorization manager that will enable the corporation to create custom roles to allocate or delegate activities within Hyper- V. The corporation will also benefit from improved VM performance provided Hyper-V. The application also has guest OS support where it supports both 64-bit and 32-bit virtual machines operating on different operating systems. Large number of users in the corporation can utilize the application since it supports a large number of users. The application provides support for virtual networking for systems in different locations thus enabling users within the corporation to communicate easily. Security   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Kris Corporation can improve its networking by practicing transparent caching on the client computer for shared folder and reducing the duration required for accessing files. This involves protocol enhancement that do away with multiple and redundant network operations when saving or opening folders. Secondly, the corporation should carry out background synchronization capabilities for offline file, reduce management overhead and supporting the end-user experience (Windows, 2015).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In conclusion, the Kris Corporation should migrate to 2012 AD since the server provides better services to its activities than the Windows Server 2008. The 2012 AD is faster, safer and incorporates more systems than the 2008 AD. The corporation should also migrate to the single domain. The single domain enables users in different geographic locations to receive the same information and be connected with each other. Single domain will enable the corporation to have a single identity in procuring orders from automotive manufacturing companies. The single sign-on can be effectively provided by the Windows Server 2012.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The DNS server of should reside in Seattle because it has adequate space and a manufacturing plant is located in Seattle. The IT staff located in Atlanta should be relocated to Seattle to effective manage the DNS server and manage the corporation’s IT systems. These staffs will also allow other staff to work effectively in Atlanta. The DHCP fault tolerance in the corporation will be implemented to improve tracking of IP address automatically. The DHCP addresses can be tracked by username, ID, and IP. Implanting Hyper-V will enable the Kris Corporation to have effective virtual connectivity among users in different locations. Lastly, the corporation can improve networking capabilities of security and file sharing through transparent caching and reducing time. References Snover J. (2012). Windows Server 2012 Remote Desktop Services (RDS). Window Server Blog. Retrieved from http://blogs.technet.com/b/windowsserver/archive/2012/05/09/windows-server-2012-remote-desktop-services-rds.aspxWindows Server (2015). Reviewing the Domain Models. Retrieved from https://technet.microsoft.com/en-us/library/cc731718%28v=ws.10%29.aspxDeuby S. (2013). 7 More Reasons to Upgrade to Windows Server 2012 Active Directory. Windows IT Pro. Retrieved from http://windowsitpro.com/identity-management/7-more-reasons-upgrade-windows-server-2012-active-directoryTermserv (2012). Remote Desktop Web Access single sign-on now easier to enable in Windows Server 2012. Remote Desktop Services Blog. Retrieved from http://blogs.msdn.com/b/rds/archive/2012/06/25/remote-desktop-web-access-single-sign-on-now-easier-to-enable-in-windows-server-2012.aspxTechNet (2015). IP Address Tracking. Retrieved from https://technet.microsoft.com/en-us/library/jj878332.aspxWindows (2015). File Sharing and O ffline Files Enhancements. Retrieved from https://technet.microsoft.com/en-us/library/dd637828%28v=ws.10%29.aspx Source document

Wednesday, October 9, 2019

The Relationship Between Objectivity and Subjectivity in Essay Writing Research Paper

The Relationship Between Objectivity and Subjectivity in Essay Writing - Research Paper Example Essay writing involves a writer expressing themselves on a presentation that was based on the five human senses. This chapter is an emphasis on the fact that writers are required to write essays that describe various phenomena, which they should explain in a manner that helped the reader understand the content of the essay. In line with this, the chapter essentially underlines that different essays have varied writing styles with each style focusing on a particular level of description that a writer should use. One other noteworthy point highlighted by the chapter regards the relationship between objectivity and subjectivity in essay writing and with regard to the underlying principles that guide description. In this case, a writer can describe an object without relying on their personal experiences and emotions about the object they described. In effect, the writer is objective in their description. Conversely, a writer may express their personal feeling and opinion regarding an obj ect, which makes the subjective in their description. Overall, the chapter is crucial in outlining the various ways that a writer can use the description in writing quality essays. First, the chapter highlights the importance of focusing on a particular line of thought regarding the subject of discussion. In this case, writers are supposed to base the content of their essay on a thesis statement, which becomes the line of thought throughout the essay. Conversely, the chapter highlights the use of description in choosing content that a writer should include in their essay while ensuring that the content of the essay is in line with the thesis statement, which is the essay’s dominant impression.

Tuesday, October 8, 2019

Concert Response Paper Essay Example | Topics and Well Written Essays - 500 words

Concert Response Paper - Essay Example It was a new and different page for Ryan Montbleau, not only a songwriter but a purely awesome performer. The fan’s thirst for a good performance was well quenched with a set of ten songs with a touch of rock, soul, folk and psychedelic. The performance accommodated Ryan’s first single, â€Å"Pacing like a prince. The rapport of Montbleau and his band members that has come a long way since the establishment of the band and over their many tours was all over the stage. It served as a reunion for the band members and entailed both solo and group performances with Ryan Montbleau as the lead singer and performer. Vocals from old time lyrics were blended by a perfect guitarist to bring love theme on an RnB and blues mood 1. As the album progressed towards the end an all-around texture was brought out creating a sweet-sour feeling from the guitar and vocal performance of ‘Together’. ‘Pacing like a prince’ with the thrilling guitar tunes was an RnB genre and theme which was inspired by the ‘Purple rain’ movie. The arrangement of songs, nine of them being the bands old songs had a perfect flow coating the performance with a multi-faceted texture. The soft rock texture in the music played was attributed to the stimulating guitar plucking by a long experienced guitarist blended with some old-time lyrics 1. The event’s was well chosen with the time and age group. Paradise rock Club was a convenient venue for the performance accommodating the band’s huge fan base. The Club also has a perfect history in live performances. The organization of the show only allowed in a fan base of eighteen years of age and above. This was a morally upright move n venture due to the venue and also the time. The event took place as from 9pm thus welcoming and being considerate to the working generation. The time was perfect for a good emotional and relaxing performance after a long day’s

Monday, October 7, 2019

List and describe the three choises you have if Windows is already Essay

List and describe the three choises you have if Windows is already installed on the harddrive and you want to install a different Windows operating system - Essay Example You simply pop in the CD/DVD with the higher version of Windows. Choose custom install and select upgrade. Then select the system drive as the partition to install the higher version of Windows. Wait for installation to complete. 3. Re-installing the previous version. Uninstalling the current Windows operating system and reinstalling the previous operating system. This is possible with Windows Vista and Windows 7. You simply use the original installation disk (for the previous operating system) by inserting it into your computer and following the prompts. Remember to back up your data before you commence on any of the procedures above. Also note that installation can be done using the network or USB depending on the motherboard capability for the computer being installed

Sunday, October 6, 2019

Organisms & Diseases Assignment Example | Topics and Well Written Essays - 500 words

Organisms & Diseases - Assignment Example This applies to both humans and animals. The first case of Ebola occurred in 1976. It happened through two simultaneous outbreaks, in Yambuku, Democratic Republic of Congo (DRC) and Nzara, Sudan. In DRC, it occurred in a village near Ebola River. This became the name of the disease. There are five known species of the Ebola virus: Reston, Sudan, Bundibugyo, Ivory Coast and Zaire (W.H.O 12). Ebola spreads among human population through close contact with secretions, blood, bodily fluids from infected animals and organs (W.H.O 12). Burial ceremonies that involve direct contact with the dead person play an important role in the spread of the disease. Infected semen can also transmit the disease for up to seven weeks after recovery. In Africa, infection spreads through handling of fruit bats, chimpanzees, monkeys and porcupines. The prevalence rate of Ebola is only monitored in a few countries: Uganda, Gabon, Sudan and Democratic Republic of Congo (DRC). Last year there was 1 case in Uganda having led to one death. In 2008, there were 44% fatalities out of 32 reported cases in DRC and in 2007 there were 25% fatalities out of the 149 reported cases in Uganda (W.H.O 12). The population increase and poverty have significantly contributed to the spread of this disease. This spread frequently occurs through retrogressive traditions like contact with deceased persons, irresponsible sexual behavior and poor sanitation. Most of the human-animal’s transmissions reflect the human wildlife conflict arising from population surge and detrimental policies of settlement and population control (W.H.O (a) 12). Leishmaniasis is a disease caused by protozoa of Leishmania genus. This is a parasitic protozoon. It happens when humans are bitten by phlebotomine sand flies. These flies breed in caves, forests, and brick houses. It is in these places that they infect human beings. The disease occurs

Friday, October 4, 2019

Like Water for Chocolate Essay Example | Topics and Well Written Essays - 500 words

Like Water for Chocolate - Essay Example According to the De La Garza family tradition, the last-born daughter was not supposed to marry, or she would do so after taking care of her mother until her death. This role fell into the hands of Tita, who happened to be last born. As the family doctor, I pitied the role Tita had gotten as her birth right. It was a tradition that was both selfish, on the mother’s part, and denied Tita equal opportunities like her sisters’. Being a doctor from the United States of America, I saw this as a major infringement on Tita’s rights. When Tita fell in love with a young man named Pedro, I saw this as a chance for her to escape from traditional bondage. I was highly disappointed when Pedro was denied her hand in marriage because Mama Elena disallowed the marriage citing tradition that Tita can only marry after she is dead (Esquivel 78). According to my opinion, Mama Elena’s mistreatment and cruelty on Tita on numerous occasions, represents the same kind of treatment the civilians were receiving from the dictatorship, in governance (Esquivel 43). When Mama Elena imposed the marriage of Rosaura to Pedro, instead of Tita, strengthened my perception of the country’s leadership that was strongly rooted, in a tradition, which it used to oppress the civilians. I yearned for the day Tita would stand up to her mother and do as she wished. When Gertrudis run away and get banished by her mother, she had to come back as a general with the revolution (Esquivel 98). This gave me hope that it would be a sign to Tita, and other women, in Mexico that they can stand up against oppression and triumph. The day Tita stood up against her mother’s ghost and banished it, gave me a piece of mind since it showed me that she had acquired enough strength to be rid of her mother’s domination once and for all. The death of Roberto, Rosaura and Pedro’s son was a blessing in disguise because it gave me another chance at love. I fell in love